DATASPACE SECURITY Collaboration with SAI COMPUTER EDUCATION
SEMESTER 1
NETWORKING FOR ETHICAL HACKING
NETWORK BASICS
What is Computer Network?
Computer Network Formation
Types of Network
Usages of Computer Network
Classification of Computer Network
What is Network Packets?
Introduction to IPV4 and IPV6
OSI & TCP/IP MODE
What is OSI Model?
Layers of OSI Model ?
What is TCP/IP Model?
Layers of TCP/IP Model ?
NETWORK TOPOLOGY
What is Network Topology?
Types of Network Topology
Classification of Network Topology
What is Underlay Network?
What is Overlay Network?
TRANSMISSION MEDIA & NETWORK DEVICE
What is Transmission Media?
Wired Medium
Wireless Medium
What is Nic Card?
Repeaters and Hubs
Bridge and Switches
Router
Firewalls
PORTS & PROTOCOL
What is TCP?
What is UPD?
What is HTTP?
What is FTP?
What is TFTP?
What is SMTP?
What is POP?
What is ICMP?
What is RDP?
IP SUBNETTING
IP Addressing
Classification of ip Address
IPV4 and IPV Subnets
IP Sub netting
Troubleshooting IP Addressing
SEMESTER 2
PYTHON PROGRAMMING
INTRODUCTION TO PYTHON PROGRAMMING
Python Programming Course in Kolkata is A Famous Programming Language Python Was Made By Guido Van Rossum and Delivered in 1991.it is utilized For web Advancement ( Worker Side),Programming Improvement, Arithmetic, Framework Scripting.it Very Well May Be Utilized to Deal With Large information and Perform Complex Arithmetic it Can Likewise be Utilized for Fast Prototyping , or for Creation-Prepared Programming advancement.
DATA TYPES AND VARIABLES
A Variable Can be Considered as A Memory area That Can Hold Estimations of A Particular Kind The Worth in A Variable May Change During The existence of The Program-Henceforth The Name “Variable. “Variable Information is characterized as Numeric Data Types in Python and Figures Used To Assemble Control Outlines.
DECISION MAKING AND CONDITINAL STATEMENT
Dynamic Designs Necessitate That The Software Engineer Indicates at Lest one Condition to be assessed or Tried by the Program ,Alongside an assertion or Articulations to be Executed to be Valid, and Alternatively , Different Proclamations to be Executed if the Condition is Resolved to be Bogus.
LOOPING
A Looping is Utilized For Executing a Square of Articulations Over and Over Until A Specific Condition is fulfilled.
TUPLES AND DICTIONARIES
A Dictionary is A Hasa Table of Key-Esteem Sets. Rundown and Tuple is an Arranged Assortment of Things.
USER-DEFINED FUNCTIONS
A User-Defined Function is A Square of Code That Plays out A Particular Assignment. These Capacities are Known as Client Characterized Capacities.
MODULES AND USER-DEFINED PACKAGES
A Module is A Document Containing Python Code. A Bundle, Notwithstanding, Resembles A Catalog That Holds Sub-Bundles and Modules.
OBJECTED ORIENTED PROGRAMMING
OOP Represents Object-Oriented Programming Python Course. Procedural Writing Computer Programs are Tied in With Composing Techniques or Capacities That Perform the Procedure on the Information, While Object-Arranged Writing Computer Programs are Tied in With Making Objects That Contain Both Information and Capacities
EXCEPTIONAL HANDLING
An Exceptional Handling is an Occasion, Which happens during the Execution of a Program That Disturbs the Typical Progression of The Program’s Directions. All in all, when A Python Content Experiences A Circumstance that it Can’ adapt to, it Raises an Exemption. An Exceptional Handling is A Python objet that addresses A Blunder.
FILE HANDLING Python also Upholds File Handling and Permits Clients to Deal with Records I.E., to Peruse and Compose Records, Alongside Numerous Other File Handling Python Alternatives, to Work on Documents.
SOKET AND NETWORK PROGRAMMING
Socket And Network Programming Is One Of The Best Python Programming Course. It Is A Method Of Associating Two Hubs On An Organization To Speak With One Another. One Socket (NODE) Tunes In On A Specific Port At An IP, While The Other Attachment Contacts The Other To Frame An Association.
GUI PROGRAMMING USING PYTHON
Python GUI Programming Course Gives Different Alternatives To Creating Graphical UIS (GUIS). A Graphical UI Is An Application That Has Catches, Windows, And Bunches Of Different Gadgets That The Client Can Use To Interface With Your Application By Learning Python GUI Programming Course.
CREATING HACKING TOOLS USING PYTHON
There Are A Lot Of Tools Available For Python, But With This Course, You Will Be Able To Make Your Own Tools.
PROJECT
You Can Utilize Python For Web Advancement, Information Science, Work Area Applications, And The Sky’s The Limit From There, With So Numerous Choices , It Very Well May Be Difficult To Pick Your Next Project Thought.
SEMESTER-3
ETHICAL HACKING
INTRODUTION
Lecture 1:- What is hacking
Lecture 2:- What is ethical hacking
Lecture 3:- Type of hacking
Lecture 4:-White hat hacker
Lecture 5:-Black hat hacking
Lecture 6:-Grey hat hacking
Lecture 7:-Script kiddies
Lecture 8:- Hacktivists
Lecture 9:- Spy hackers
Lecture 10:-cyber terrorists
Lecture 11:-Vulnerability
Lecture 12:- Exploit
Lecture 13:- Remote Exploit
Lecture 14:- Local Exploit
Lecture 15:- Aero-Day
Lecture 16:- Zero-Day Vulnerability
Lecture 17:- Zero-Day Exploit
Lecture 18:- Brute Force Attack
Lecture 19:- Phishing
Lecture 20:- Remote Access
Lecture 21:- Payload
Lecture 22:- Information gathering
Lecture 23:- Active Information gathering
Lecture 24:- Passive Information Gathering
Lecture 25:- Scanning
Lecture 26:- Gaining Access
Lecture 27:- Maintaining Access
Lecture 28:- Covering Tracks
Lecture 29:- Viruses & Worms
Lecture 30 :- Trojan Horse
Lecture 31:- Spyware
Lecture 32:- Adware
Lecture 33:- backdoor
Lecture 34:- Root kits
Lecture 35:- Ransom ware
Lecture 36:- What is Penetration Testing
Lecture 37:- Types of Penetration Testing
Lecture 38:- What is White Box Penetration testing
Lecture 39:- What is Black Box Penetration Testing
Lecture 40:- Introduction To Linux OS
Lecture 41:- Social engineering
Lecture 42:- Google Hacking Using Google Dorks
LAB SETUP AND CONFIGURATION
Lecture 43:-What is Virtual Machine
Lecture 44:-What is VMware
Lecture 45:-What is Virtual Box
Lecture 46:-Install VMware
Lecture 47:-Install VMware
Lecture 48:-Install Windows Os
SYSTEM HACKING
Lecture 49:-Vulnerability Scanning Using Nessus
Lecture 50:-Exploit Using Metasploit
Lecture 51:-Network Scanning Using Nmap
Lecture 52:-Windows 10 Hacking
Lecture53:-Windows 10 UAC Bypass
SOCIAL ENGINEERING
Lecture 54:-Phishing Attack
Lecture 55:-Setoolkit Usages
Lecture 56:-Rat ( Remote Access Trojan)
Lecture 57:-Using Rat Hack Systems
Lecture 58:-Ngrok Usages
Lecture 59:-Android Phone Hacking
WIFI HACKING
Lecture 60:-WI-Fi Encryption
Lecture 61:-Hack WI-Fi Access Point
Lecture 62:-Dos Attack
Lecture 63:-DDOS Attack
WEB APPLIATION PENTESTING
Lecture 64:-How Web Application Works
Lecture 65:-Request and Response
Lecture 66:-Installing Scanner ( Acuntix , Netsparker) Scanning
Lecture 67:-Website Basic
Lecture 68:-Owasp Top 10
Lecture69:-What is SQL-Injection?
Lecture 70:-Types of –Injection
Lecture 71:- Live Demo on SQL-Injection
Lecture 72:-What is Xss
Lecture 73:-Types of Xss
Lecture 74:-Live Demon on Xss All Types
Lecture 75:-What is HTML Injection
Lecture 76:-Live Demo on HTML Injection
Lecture 77:-What is Directory Listing
Lecture 78:-Live Demo on Directory Listing
Lecture 79:-What is Broken Authentication
Lecture 80:-Live Demo on Broken Authentication
Lecture 81:-What is Tamper Data?
Lecture 82:-Live Demo an Tamper Date on Ecommerce Site
Lecture 83:-What is Shell
Lecture84:-Hack Web –Server Using Web-Shell
SEMESTER 4
WEB APPLICATION PENETRATION TESTING
UNDERSTANDING HTML& LAB SETUP
Web Application Structure
HTML Request and Response
Lab Setup
Install Xampp Server
Setup Vulnerable Web Application
Setup Dvwa
Setup Bwapp
Setup Webgoat 7.1
Setup Burp-Suite
Setup Burp-Suite Ca Certificate
Setup Firefox old Version (40.0) With No-Redirect
Addon
Setup Netsparker
Setup Acunetix
Setup Vm-Ware
Install Kali-Linux
OWASP TOP 10 & SQL-INJETION
Owasp Top 10 & Sql-Injection
Setup Vulnerable Web Application
Setup Dvwa
Setup Bwapp
Sql-Injection What is Sql Injection? How You Can Find Out Sql Injection Vulnerability In Website? What is Get Method?
How You Can Find Out Sql-Injection Vulnerability In Get Parameter? How You Can Exploit That Vulnerability What is Sqlmap and How You Can Use it? What is Post Method?
How You Can Find Out Sql-Injection Vulnerability In Post Parameter? How You Can Bypass Login Page Auth Using Sql-in Jection Vulnerability? How You Can Use Different Types of Payload To Bypass Login Page?
CROSS SITE SCRIPTING – XSS
What is intruder? How You Can use it? Cross Site Scripting ( XSS) What is Cross Site Scripting Vulnerability?
Where You Can Find Out XSS Vulnerability? Types of XSS? Details of Persistence XSS Details of N-Persistent XSS
Details of Dom Based XSS XSS Demo on Live Website Cookie Stealing Using XSS Vulnerability
ROSS SITE REQUEST FORGERY (CRSRF)
Cross Site Request Forgery (CSRF) what is CSRF?
Where You Can Find out CSRF Vulnerability? CSRF Live Demo on Get Method CSRF Live Demo on Post Method
DIFFEENT TYPES OF INJECTION
Different Types of injection What is Command injection? Live Demo on Command injection What is Code injection What is X-Path injection? Live Demo on X-Path injection What is Ldap injection? What in HTML injection Live Demo on HTML injection What is XXE? Live Demo on THML injection What is XXS? Live Demo on XXS What is XXE? Live Demo on XXE Whet is XML-injection Security Misconfiguration What is is Security Misconfiguration? +What is Directory Listing ? Live Demo on Directory Listing Vuulnerability What is Core?
Live Demo on Course What is Option Method? How it’s Effect?
Session hijacking what is Sessions? How We can Bypass the Session?
Use Burp Sequencer How we Can Generate Sessions?
WBSRVER HECKING & BURP-SUITE
Web shell or Webserver Hacking What is Web shell? How You Can Hack Webserver Using Web shell?
How you Can Bypass Client Side Validation and Uploading Web shell? How You Can Bypass Content Type Validation and Uploading Web shell? What is RFI and Using RFI How You Can Access Web Server? Using Weevely How You can Upload Web shell? Burp Suite Manual Testing Using Burp Suite How You Can do Manual Testing? What is Spider How You Can Use it? What is Intruder How You Can Use It? What is Repeater How You Can Use It? What is Sequencer How You Can Use It? What is Decoder How You Can Use It? What is Compare How You Can Use It? What is Extender How You Can Use It?
VULNERABILITY SCANNING
Vulnerability Scanner Automation Testing, Using Scanner How You Can Do Automation Testing? What is Netsparkar How You Can, Use it? URL Redirect and Forward what is Url Redirect and Forward? Insecure Deserialization What is Insecure Deserialization? Using Components with Known Vulnerabilities What is Using Components With Known Vulnerabilities? Insufficient Logging and monitoring what is Insufficient Logging and Monitoring? Broken Authentication what is Broken Authentication? How You Can Bypass Post Login Page Without Valid Sessions? How You Can Use No-Redirect Add-On? Broken Access Control What is Broken Access Control? Live Demo on Broken Access Control
SEMESTER 5
NETWORK PENETRATION TESTING
INTRODUCTION TO NETWORK PENETRATION TESTING
It is a Process of Identifying and prioritizing the Vulnerabilities in A Target. Pen Tests Include an Assortment of Approaches Intended To Investigate an organization to Distinguish Possible Weaknesses and Test to Guarantee the Weaknesses are Genuine
LAB SETUP
A Hypervisor or Cloud Climate to Have Your Machines an Objective Machine-A Machine You Will Check, Find Ports, Administrations, and Weaknesses. And Afterward Dispatch Assaults on.
DEEP INFORMATION GATHERING
Information Gathering is The Demonstration of Social occasion Various Types of Data Against
The Focus on Casualty or Framework.
GETTING INTO SYSTEM
It is one of the Most Important Steps in Network Penetration. Getting Into A System Leads You To The Next Step.
ANDROID HACKING
It is the Practice of Controlling or Acquiring Unapproved Admittance to Cell Phones, For Example, by Catching Calls Phones, For Example, By Catching Calls Draw Clients to Download Applications from Untrusted Sources. These Android Hacking Apps May Contain Malicious Programming Inside Them, Giving the Aggressor Far off Admittance to Hack Android Phones When The Apk is Introduced By The client it the Point When the Clients Click That Specific Connection in the Message They Might Be Diverted to A Malignant Site Parting With Their Delicate Data or May Prompt Monetary Misfortune. Or Can Also Hack WI-Fi Passwords Online and Android Devices.
SNIFFING AND MITM
Mitm is A Class of Assault and Sniffing is Just the Word For Examining Bundles of The Organization.
ANONYMITY
The Quality or Condition of Being Unknown Delighted in the Secrecy of Life in an Enormous City. Basically Comprehended Somebody is Mysterious if His / Her
Anonymous Function Isn’t Known.
SOCIAL ENGINEERING
Social Engineering in Cyber Security is The Craft of Controlling Individuals so They Surrender Secret Data. Social Engineering Techniques is the Specialty of Abusing Human Brain Research, Instead of Specialized Hacking Strategies, to Access Structures, Frameworks, or Information.
ATTACKING WIFI NETWORK
Normally Known as Remote Organization Assaults, Infiltration and Interruption Acts That Target Remote Organizations Present Genuine Dangers.
WIFI AS AN ATTACK VECTOR
Generally Known as Remote Organization Assaults, Infiltration, and Interruption Acts That Target Remote Organizations Present Genuine Dangers. You Can Also Learn WI-FI Network Hacking
- 3 Months Internship Program after the Course
- Group Discussions with LIVE PROJECT
- Whats App Group Tech Support
- Placement Support
- World Recognized Certificate
- 100% Practical Live Classes (Both Online & Offline)
- Lifetime Access To Data Space Lab With Unique Login Id & Password
for (100 + Videos & 50+ PDF)
- Classes Conduct by Best Industry Experts
- Pocket Friendly With Easy EMI Option
DATASPACE SECURITY Collaboration with SAI COMPUTER EDUCATION